SSH

Definition

SSH protocol is using cryptography for multiple features (Key exchange, Signature, Encryption, Message Authentication Code). Each of these feature use a set of cryptography algorithms.

This page aims at listing compatible algorithms with the Scalingo platform.

Scope

SSH Servers used for:

List of accepted algorithms

# key exchange algorithms
(kex) curve25519-sha256@libssh.org   -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
(kex) diffie-hellman-group14-sha256  -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73

# host-key algorithms
(key) rsa-sha2-512 (4096-bit)        -- [info] available since OpenSSH 7.2
(key) rsa-sha2-256 (4096-bit)        -- [info] available since OpenSSH 7.2
(key) ssh-ed25519                    -- [info] available since OpenSSH 6.5

# encryption algorithms (ciphers)
(enc) aes256-ctr                     -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
(enc) chacha20-poly1305@openssh.com  -- [info] available since OpenSSH 6.5
                                     `- [info] default cipher since OpenSSH 6.9.
(enc) aes128-gcm@openssh.com         -- [info] available since OpenSSH 6.2

# message authentication code algorithms
(mac) hmac-sha2-256-etm@openssh.com  -- [info] available since OpenSSH 6.2
(mac) hmac-sha2-256                  -- [warn] using encrypt-and-MAC mode
                                     `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56

Compatibility

Minimum version of OpenSSH to connect to these servers is 7.2, released in February 2016.


Suggest edits

SSH

©2024 Scalingo